Security Protocols In Sensor Networks. Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Data Communications and Networking
Security in Wireless Sensor Networks: Key Management Approaches
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Trust relationships in sensor networks Ruben Torres October 2004.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
Denial of Service in Sensor Networks Szymon Olesiak.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of Califonia at Berkeley Paper review and.
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks C. Karlof, N. Sastry, D. Wagner SPINS: Security Protocol for Sensor Networks A.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures by Chris Karlof, David Wagner Presented by William Scott December 01, 2009 Note:
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security In Wireless Sensor Networks by Adrian Perrig, John Stankovic, and David Wagner.
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
Chris Karlof David Wagner University of Califonia at Berkeley
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Chris Karlof and David Wagner University of California at Berkeley
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Security in Wireless Sensor Networks by Toni Farley.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
An Overview of Security Issues in Sensor Network
Lecture 36.
Lecture 36.
Presentation transcript:

Security Protocols In Sensor Networks

Introduction –Security in sensor networks is important to prevent unauthorized users from eavesdropping, obstructing and tampering with sensor data, and launching denial-of-service (DOS) attacks against entire network –The challenges of designing and implementing of a secure routing in WSN are as follows: 1.The vulnerability of the network to eavesdropping, spoofing, unauthorized access, and DOS attacks increases due to the wireless communication among the sensor nodes 2.The limited resource constraints of the sensor nodes, such as memory, CPU, bandwidth, and battery life, hinders the degree of implementation of encryption, decryption and authentication mechanisms in individual sensor nodes A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Introduction 3.Physical security risk of being deployed in the field – individual sensor nodes can be obtained and face attacks from an unauthorized user in order to compromise a single sensor node. If attack is successful, a compromised sensor node can start malicious activities within the network such as false routing information and launching DOS attacks –The secure routing protocol should handle such attacks such that networks continues to function properly –Since this paper assumes that base station has more resources to defend against these kinds of attacks; therefore, it investigates on how to secure the system against attacks on the resource-poor sensor nodes A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Introduction –This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS –More specifically, it evaluates implementations on the motes of the RC5 and AES encryption standards:  RC5-based scheme to generate message authentication codes (MACs) and  RC5-based generation of one-way sequence numbers –The proposed secure routing protocol is resilient to obstruction of the data delivery, develops end-to-end integrity checksums and authentication schemes to detect tampering with sensor data A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Introduction –INSENS has the property that a single compromised node can only disrupt a localized section of the network and is not enough to stop the entire network from functioning –The INSENS system adheres to the following design principles: 1.The individual nodes are not allowed broadcast to the entire network in order to prevent DOS flooding attacks – only base station can broadcast and it is considered as a gateway to the wired network. The base station is loosely authenticated via one-way sequence number such that nodes cannot spoof the base station and flood the network. Sensor nodes can unicast a packet only to the base station. Peer-to-peer sensor communication is not directly supported; however, tunneling through the base station allows indirect sensor-to-sensor communication A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Introduction 2.Control routing information needs to be authenticated to prevent false routing data advertisements. This way, the base station receives correct knowledge of the topology even if it may not represent the full view due to malicious packet dropping 3.To address resource constraints:  Symmetric key cryptography is chosen for confidentiality and authentication between a base station and a sensor node instead of computation intensive public key cryptography techniques  Base station is in charge for computation and dissemination of the routing tables 4.The redundant multipath routing is built into INSENS to achieve secure routing. The goal is to have disjoint paths such that even if the intruder compromises a node or a path, secondary paths will function correctly A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Introduction A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003] Figure 1: Sample asymmetric WSN topology rooted at the base station. Triangle node is a malicious node. Black nodes are its downstream nodes. Intrusion-tolerant routing is assisted by multiple paths; downstream nodes can still communicate with the base station

Protocol Description –The INSENS is comprised of a route discovery phase and data forwarding phase –The route discovery phase builds appropriate forwarding tables at some nodes and it is divided into three rounds 1.Route request: The base station floods a request message to all reachable sensor nodes 2.Route feedback: Each sensor node sends its neighborhood topology information back to the base station using a feedback message 3.Computing and propagating multipath routing tables: The base station authenticates the neighborhood information, builds a topological view of the network, computes the forwarding tables for each sensor node, and sends the tables to the appropriate nodes using a routing update message A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Protocol Description –The data forwarding phase forwards data from each sensor node to and from the base station –A symmetric communication channel is assumed –Each node has a shared symmetric key with base station and has a globally known one-way function F and initial sequence number K 0 –F and K 0 are used to authenticate messages from the base station –The shared symmetric key, F and K 0 are distributed in advance – preprogrammed into each sensor node prior to deployment A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks [Deng+ 2003]

Advantages: –Builds a secure routing protocol, rather than placing security layer on top of existing routing protocols –INSENS prevents DoS-style attacks by not allowing individual nodes to broadcast to the entire network –The resource rich base station is chosen as the central point for computation rather than resource-poor network nodes –Redundant multipath routing is used to achieve secure routing –The one-way cryptographic hash function used to generate the sequence helps hiding attacker from guessing the next sequence number to spoof the network –It is not constrained by time synchronization or delayed release schedule A Transmission Control Scheme for Media Access in Sensor Networks [Woo+, 2003]

Disadvantages: –Base stations are given too much responsibility and thus the prime target for hackers to bring the entire network down –If an alternate path is not available, then the network is susceptible to partitioning under attack –No mentioning about the advantages of building a bottom up secure routing protocol (i.e. no numerical comparison of the proposed approach with other approaches) A Transmission Control Scheme for Media Access in Sensor Networks [Woo+, 2003]

Suggestions/Improvements/Future Work: –For multipath routing table dissemination, meshed multipath routing algorithm can be used –Further route failure detection via flow monitoring and overlay routing for route reconfiguration can be added to ensure fault tolerance in WSN –Better algorithm to find disjoint multi paths with minimum number of common nodes between node and base station

Introduction –It is very difficult to incorporate security mechanisms into sensor routing protocols after the design has completed –Therefore, sensor network routing protocols must be designed with security considerations and this is the only effective solution for secure routing in sensor networks –The main contributions of this paper are as follows: 1.Proposed threat models and security goals for secure routing in wireless sensor networks 2.Introduced two novel classes of previously undocumented attacks against sensor networks: sinkhole attacks and HELLO floods 3.It is shown how attacks against ad hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Introduction 4.Presented the first detailed security analysis of all the major routing protocols and energy conserving topology maintenance algorithms for sensor networks – described practical attacks against all of them that would defeat any reasonable security goals 5.Discussed countermeasures and design considerations for secure routing protocols in sensor networks Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Introduction Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003] Figure 2: Sensor network legend All nodes may use low power radio links, but only laptop-class adversaries and base stations can use low latency, high bandwidth links Figure 3: A representative sensor network architecture

Problem Statement: A. Network Assumptions –Due to wireless communications, the radio links are insecure –Attackers can eavesdrop on radio transmissions, inject bits in the channel, and replay previously heard messages –It is assumed that the adversary can deploy few malicious nodes with similar hardware capabilities as the legitimate nodes –It is not assumed that sensor nodes are tamper resistant –Even though tamper resistance might be a defense for physical node compromise, this is not considered a general purpose solution since effective temper resistance can add significant per-unit cost, and sensor nodes are generally inexpensive Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Problem Statement: B. Trust Requirements –Base stations are assumed to be trustworthy to behave correctly since they act as gateway nodes to the outside world –Aggregation points which are often regular nodes are trusted in certain protocols to accurately combine other messages to forward to base stations –It is possible that adversaries may deploy malicious aggregation points or turn malicious nodes into aggregation points; therefore, aggregation points may not be trustworthy Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Problem Statement: C. Threat Models –There is a difference between mote-class and laptop-class attackers –In mote-class attackers, the attacker has access to a few sensor nodes with similar capabilities to motes, but nothing more –A laptop-class attacker may have access to more powerful devices in which case, malicious nodes have advantages over legitimate nodes – may jam the entire network using stronger transmitter, eavesdrop on an entire network, may have high bandwidth low-latency channel –Second distinction can be made between outsider and insider attacks –The discussion so far has been related to the outsider attacks, where the attacker has no special access to the network Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Problem Statement: C. Threat Models –Insider attacks may occur either when an authorized participant in the network has been compromised, running malicious code or adversaries who have stolen the key material, code, and data from legitimate nodes D. Security Goals –Ideally, a secure routing protocol should guarantee the integrity, authenticity, and availability of messages in the presence of adversaries –Protection against eavesdropping is not an explicit goal for secure routing –Routing protocol should prevent eavesdropping caused by misuse of abuse of the protocol itself, for instance, eavesdropping achieved by the cloning or rerouting of a data flow should be prevented Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Problem Statement: D. Security Goals –Protection against the replay of data packets is not the responsibility of the secure routing protocol, rather application layer can provide such service since only the application can fully and accurately detect the replay of data packets –In the case of insider laptop-class attacks, all of these goals are not fully attainable –Instead of complete compromise of the network, it is expected to have graceful degradation at best –The degradation should be no faster than a rate approximately proportional to the ratio of compromised nodes to total nodes Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing A. Spoofed, altered, or replayed routing information –This is the most direct attack against a routing protocol –Adversaries may be able to create routing loops, attract or repel network traffic, extend or shorten source routes, generate false error messages, partition the network, increase end-to-end delay latency B. Selective Forwarding –Malicious nodes may refuse to forward certain messages, drop them, ensuring that they are not propagated any further –In order not get noticed by the neighboring nodes by not forwarding the packets, the adversary may selectively forwards the packets Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing B. Selective Forwarding –It is most effective when the attacker is explicitly included on the path of a data flow –An adversary overhearing a flow passing through neighboring nodes might be able to emulate selective forwarding by jamming or causing a collision on each forwarded packet of interest C. Sinkhole Attacks –Adversary tries to lure all the traffic from a particular area through a compromised node, creating a metaphorical sinkhole with the adversary at the center Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing C. Sinkhole Attacks –Typically works by making a compromised node look attractive to surrounding nodes with respect to the routing algorithm –The adversary could spoof or replay an advertisement for high quality route to a base station –Due to either real or imagine high quality route through compromised node, each neighboring node of the adversary will forward packets destined for a base station through the adversary –Since all packets share the same destination (the only base station), a compromised node needs only to provide a single high quality route to the base station to influence a large number of nodes Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing D. The Sybil Attack –A single node presents multiple identities to other nodes in the network –This type of attack can reduce the effectiveness of fault-tolerant schemes and pose a threat to geographic routing protocols –Adversary can be in more than one place at once by using this attack E. Wormholes –An adversary tunnels messages received one part of the network over a low latency link and replays them in a different part –Wormhole attacks generally involve two distant malicious nodes colluding to understand their distance from each other by relaying packets along an out-of-bound channel available only to the attacker Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing E. Wormholes –An adversary can convince nodes who are multiple hops away from the base station to believe that they are only one or two hops away via the wormhole – this creates a sinkhole –Wormholes can be used to convince two distant nodes that they are neighbors by relaying packets between the two of them –This attacks can be combined with selective forwarding or eavesdropping F. HELLO Flood Attack –A laptop-class attacker broadcasting routing or other information with large enough transmission power could convince every node in the network that the adversary is its neighbor Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing F. HELLO Flood Attack –An adversary advertising a high quality route to the base station to every node in the network can cause large number of nodes to use this route, leaving the network in the state of confusion –An adversary can re-broadcast overhead packets with enough power to be received by every node –HELLO floods can be considered as one-way broadcast wormholes and uses a single hop broadcast to transmit a message to a large number of nodes unlike the traditional definition of flooding denoting epidemic-like propagation of a message to every node in the network Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Attacks on Sensor Network Routing G. Acknowledgement Spoofing –An adversary can spoof link layer acknowledgements for overhead packets addressed to the neighboring nodes –A sender can be convinced that a weak link is strong or a dead node is alive since packets sent along weak or dead links are lost –An adversary can mount a selective forwarding attack using acknowledgment spoofing by encouraging the target node to transmit packets on those weak links Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Advantages: –The authors outline a number of attacks that are possible on a sensor network. They introduce two new kinds of attacks that are specific to sensor networks –The authors present the drawbacks of the existing protocols to overcome these threats –It is reported that the majority of outsider attacks against sensor network routing protocols can be prevented by simple link layer encryption and authentication using globally shared key –The analysis of various possible attacks on WSN give insight into the sorts of countermeasures required for security in WSN Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Disadvantages: –Energy requirements and overheads of implementing the countermeasures are not presented –The authors have not simulated or provided any platform to show that the countermeasure actually works –The use of geographical information for security carries heavy overhead Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

Suggestions/Improvements/Future Work: –Multipath routing to multiple destination base stations can be as a strategy to provide tolerance against individual base station attacks and/or compromise –Relocation of the base station in the network topology can be studied as a means of enhancing resiliency and mitigating the scope of damage –Develop application specific security schemes and counter measures for given attacks Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [Karlof+ 2003]

[Deng+ 2003] J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks, Proceedings of IPSN [Karlof+ 2003] C. Karlof and D. Wagner, Secure Routing in Sensor Networks: Attacks and Countermeasures, Proceedings of SNPA [Perrig+ 2001] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, SPINS: Security Suite for Sensor Networks, MobiCom 2001, Rome, Italy, pp References